exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2000-08-31

clientagent662.txt
Posted Aug 31, 2000
Authored by Zorgon | Site nightbird.free.fr

Client Agent 6.62 for Unix Vulnerability, Tested on a Debian 2.2.14, Client Agent has a hole allowing to execute an arbitrary code by root without its knowing. In the meantime, some conditions are necessary to exploit this vulnerability. Client Agent is used with ARCserveIT, the safe software. It must be installed on all the workstations. A global configuration file agent.cfg keep every sub-agents installed on your system. This file is in /usr/CYEagent, and receive the information from the sub-agent when the script /opt/uagent/uagensetup is run.

tags | exploit, arbitrary, root
systems | linux, unix, debian
SHA-256 | 1daaedd6f40ccb604880096f68d1f14543064744d2f5c8d9d8a384929bef9ccd
vpn-root.txt
Posted Aug 31, 2000
Authored by Loki

RapidStream has hard-coded the 'rsadmin' account into the sshd binary in the appliance OS. The account has been given a 'null' password in which password assignment and authentication was expected to be handled by the RapidStream software itself. The vendor failed to realize that arbitrary commands could be appended to the ssh string when connecting to the SSH server on the remote vpn. This in effect could lead to many things, including the ability to spawn a remote root shell on the vpn.

tags | exploit, remote, arbitrary, shell, root
SHA-256 | 4b922cd0b6565086e642ee2ff57903babce23e38618ab193b67f145f89db55fd
faith13.zip
Posted Aug 31, 2000
Authored by faith | Site f41th.org

Faith Issue 13 - Local AXE10 Exchange Subsystems, Bypassing Physical Security, CCITT Signalling System No.6, BT Operator 999 Emergency Call Routing, Cellular Tracking Part II, UK Hand Scan of 0800 056 0xxx/1xxx, UK Hand Scan of 0808 100 2xxx, Plague v0.1

tags | local, magazine
SHA-256 | 344dbe0b1bc71850805263dcab7c7e4ff415fb19f9123df8cad493e2568b6c01
faith13.txt
Posted Aug 31, 2000
Authored by faith | Site f41th.org

Faith Issue 13 - Local AXE10 Exchange Subsystems, Bypassing Physical Security, CCITT Signalling System No.6, BT Operator 999 Emergency Call Routing, Cellular Tracking Part II, UK Hand Scan of 0800 056 0xxx/1xxx, UK Hand Scan of 0808 100 2xxx, Plague v0.1

tags | local, magazine
SHA-256 | 814a7afbccac570db70a852ae88105006323c722c1b8781d3a1bcd77103f00db
heh-4.tar.gz
Posted Aug 31, 2000
Authored by heh | Site digitalrebel.net

HEH! Magazine Issue #4 (In Spanish). Shared Secret Systems, Funny Coding, CDMA vs TDMA, IPv6, and more discussed.

tags | magazine
SHA-256 | 6b6f6132c146104b649448042696e3c16349f1aedd348ec51a32c59bb4c5eca1
sscan2k-pre5.HWA.tar.gz
Posted Aug 31, 2000
Authored by eth0 | Site hwa-security.net

sscan2k-pre5, Remote Auditing Tool that scans for more than 200 known vulnerabilities that are able to be found remotely, It depends on the operating system that the target host is running on to check for the vulnerabilities to prevent unecessary bandwidth to be used. Now comes with an easy to use configuration program much like xf86config, it also brings the option to use NMAP to guess operating system or to use sscan2k's scripted modules which are very updatable by the user. Multiple host scanning was improved.

tags | remote, vulnerability
SHA-256 | 142651be5ebe17ddb59e411574ccb8d9778eb8ce60349d3c16584cafead65519
Msadcs.exe
Posted Aug 31, 2000
Authored by Neon-Lenz | Site TheGovernment.com

MSADCS.DLL Checker is a program for Windows 9x that checks a web server for MSADCS.DLL and the location of the public directory. When the msadc2.pl RDS exploit is located in the same directory as MSADCS.DLL Checker, it will attempt to run the exploit on the target webserver.

tags | web
systems | windows
SHA-256 | 547854dac0db09e8be775f2c9e2f26e8ad988ba699ab79ab48947751047992a7
AccountManSploit.zip
Posted Aug 31, 2000
Authored by n30

Product: Account Manager, Versions: ALL including LITE and PRO haven't been able to test ENTERPRISE, OS: Unix and Winnt, Vendor: Notified, https://www.cgiscriptcenter.com/, The Problem: The Script allows any remote user access to the Administration Control Panel through overwriting the Admin Password with one of their own making.

tags | exploit, remote, web
systems | windows, unix
SHA-256 | da34cff8b8f0d5966a4b6803ba977cef75551738f799ae94a3f2632310f2b83e
npulse-0.2.tar.gz
Posted Aug 31, 2000
Authored by Dr. Steven Horsburgh | Site horsburgh.com

nPULSE is a web-based network monitoring package for Unix-like operating systems. It can quickly monitor tens, hundreds, even thousands of sites/device s at a time on multiple ports. nPULSE is written in Perl and comes with its own mini web server for extra security.

tags | tool, web, perl, nmap
systems | unix
SHA-256 | 4b59a903f9184441c77a5ce3dc3ad98ec9c6f36ba79547feb8a9549f270c48ad
mersypop3.zip
Posted Aug 31, 2000
Authored by Snake, rootshell

MersyPop3.exe is a tool that can be used by network administrators to test the strength of pop3 passwords. A "Guessing" utility.

SHA-256 | c80a2ed668a9ad501f1041d38f3a078caa0e5044311950c64835adcd3b486a2e
omegav3.tgz
Posted Aug 31, 2000
Authored by Xt

Omega v3 Beta is another new DDoS program.

tags | denial of service
SHA-256 | 44dc22110d1ba998a9af08b7cb232e45dd8cf53b02f90129fc5fd1d3d7c37312
elsa.pl
Posted Aug 31, 2000
Authored by Zonez security

elsa.pl is a script which will delete all usage statistics of an Elsa Microlink cablemodem. Disallowing any CMTS from polling the data.

tags | tool
systems | unix
SHA-256 | c1aba9acb383b9b1495eedf882b3c3e84bbecc2763fc85328ff6529d65c0b7fb
sscan2k-pre4.HWA.tar.gz
Posted Aug 31, 2000
Authored by eth0 | Site hwa-security.net

sscan was given to buffer0verfl0w security by jsbach for the project to be continued for jsbach. From now on sscan will go as sscan2k. sscan2k now has updated vulnerability checks and the code has also been cleaned up. This scanner is now a release of HWA.

SHA-256 | 67bbe3fc726dad8001a1316048e0168304b62884accaa1d0ccdd859f189155a9
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close